SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
           – Fourth level
                Malware * punct ro
               » Fifth level




                Costin G. Raiu
                Chief Security Expert, Kaspersky Lab EEMEA
                craiu@kaspersky.ro
Click to edit MasterLab style
Despre Kaspersky title


•• Fondata 1996Master text styles
    Click to edit
    – Second level
• 1600+ de angajati
        • Third level
• 28 de birouri locale
            – Fourth level
   – Olanda, Anglia,level
               » Fifth Franta, Germania, Japonia, Romania, Africa

     de Sud, etc…
• Centre de cercetare in Rusia, Romania, Statele Unite,
  China, Japonia, Germania
• In Romania din 2003
• Peste 300 de milioane de utilizatori
• +50K utilizatori noi zilnic
Lider in inovatia ITSec
Click to edit Master title style

• Din 1996 pana in prezent:
• Click to edit Master text styles WS/FS/AS ruland
  – solutii de securitate integrate pe
    – Linux/FreeBSD
      Second level
• Patente: level
      • Third
    – Detectia, eliminarea cailor troieni - Patent No. 7472420
           – Fourth level
      / US Patent and Trademark Office, 30 December, 2008
               » Fifth level

    – Analiza euristica - Patent No. 7530106 / US Patent and
      Trademark Office, 5 May, 2009
    – Integritatea aplicatiillor - Patent No. 7526516 / US
      Patent and Trademark Office, 28th April, 2009
    – Rospatent No. 2363047 – detectie de spam in imagini
Peste 70 de patente pentru tehnologii de
protectie si securitate informatica
Proiecte locale - Romania
Click to edit Master title style


• Click to edit Master text styles
• PatroKLes
    – Second level
    – Proiectat si lansat in 2006
       • Third level
    – Scaneaza spatiul de web
          – Fourth level
               » Fifth level
      Romanesc (*.ro)
• Krab Krawler
    – Proiectat si lansat in 2009
    – Detecteaza programe malware pe
      Twitter
Click to edit Romania style
Atacuri in Master title

Statistici:
• Click to edit Master text styles
   – Second level
Aproximativ 40 de noi site-uri infectate
      • Third level
  apar in – Fourth levelin fiecare zi
          Romania
• In momentul de fata, scanam aproximativ 210,000
              » Fifth level

  de site-uri din Romania
• Numarul site-urilor scanate creste in medie cu 1600
  de site-uri noi pe luna
• La inceputul anului, 1 in 150 de site-uri romanesti
  erau infectate
Click to edit Romania style
Atacuri in Master title


• Click to edit Master text styles
   – Second level
      • Third level
         – Fourth level
             » Fifth level
Click to infectate title style
Site-uri edit Master

   2,000

• Click to edit Master text styles
  1,800
                                                                                15,000%
   1,600
   – Second level                                                              growth vs 2006

   1,400
           • Third level
   1,200
              – Fourth level
   1,000          » Fifth level
    800

    600

    400

    200

      0
                2006                 2007                   2008                 2009
                       Site-uri infectate, dintr-un total de 150k
                            Sursa: Kaspersky Lab Analytical article
                        http://www.viruslist.com/en/analysis?pubid=204792089
Kaspersky + trafic.ro
Click to edit Master title style


• Analizaedit Master text styles din trafic.ro
• Click to
           prioritara a site-urilor
• Notificarea utilizatorilor inregistrati
  – Second level
       • Third level
           – Fourth level
               » Fifth level
Click to edit Master title style


• Click to edit Master text styles
    – Second level
       • Third level
                    Multumesc!
           – Fourth level
               » Fifth level

                          twitter.com/craiu
                        www.kaspersky.ro

Weitere ähnliche Inhalte

Ähnlich wie Malware * punct ro

Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobLucidworks (Archived)
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackStefan Tanase
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDavide Benvegnù
 
Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeStefan Tanase
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted AttacksStefan Tanase
 
Latin American ccTLD Distribution strategies - ICANN 53 presentation
Latin American ccTLD Distribution strategies - ICANN 53 presentationLatin American ccTLD Distribution strategies - ICANN 53 presentation
Latin American ccTLD Distribution strategies - ICANN 53 presentationLogicBoxes
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kasperskyAgora Group
 
Enterprise DevOps
Enterprise DevOpsEnterprise DevOps
Enterprise DevOpsVistara
 

Ähnlich wie Malware * punct ro (8)

Using Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right JobUsing Solr to find the Right Person for the Right Job
Using Solr to find the Right Person for the Right Job
 
Today’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attackToday’s hidden dangers: Social networks under attack
Today’s hidden dangers: Social networks under attack
 
DevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptxDevSecOps Done Right - Strategies and Tools.pptx
DevSecOps Done Right - Strategies and Tools.pptx
 
Automated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of CybercrimeAutomated Targeted Attacks: The New Age of Cybercrime
Automated Targeted Attacks: The New Age of Cybercrime
 
Surviving Today's Targeted Attacks
Surviving Today's Targeted AttacksSurviving Today's Targeted Attacks
Surviving Today's Targeted Attacks
 
Latin American ccTLD Distribution strategies - ICANN 53 presentation
Latin American ccTLD Distribution strategies - ICANN 53 presentationLatin American ccTLD Distribution strategies - ICANN 53 presentation
Latin American ccTLD Distribution strategies - ICANN 53 presentation
 
Cat valorezi kaspersky
Cat valorezi kasperskyCat valorezi kaspersky
Cat valorezi kaspersky
 
Enterprise DevOps
Enterprise DevOpsEnterprise DevOps
Enterprise DevOps
 

Kürzlich hochgeladen

Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 

Kürzlich hochgeladen (20)

Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 

Malware * punct ro

  • 1. Click to edit Master title style • Click to edit Master text styles – Second level • Third level – Fourth level Malware * punct ro » Fifth level Costin G. Raiu Chief Security Expert, Kaspersky Lab EEMEA craiu@kaspersky.ro
  • 2. Click to edit MasterLab style Despre Kaspersky title •• Fondata 1996Master text styles Click to edit – Second level • 1600+ de angajati • Third level • 28 de birouri locale – Fourth level – Olanda, Anglia,level » Fifth Franta, Germania, Japonia, Romania, Africa de Sud, etc… • Centre de cercetare in Rusia, Romania, Statele Unite, China, Japonia, Germania • In Romania din 2003 • Peste 300 de milioane de utilizatori • +50K utilizatori noi zilnic
  • 3. Lider in inovatia ITSec Click to edit Master title style • Din 1996 pana in prezent: • Click to edit Master text styles WS/FS/AS ruland – solutii de securitate integrate pe – Linux/FreeBSD Second level • Patente: level • Third – Detectia, eliminarea cailor troieni - Patent No. 7472420 – Fourth level / US Patent and Trademark Office, 30 December, 2008 » Fifth level – Analiza euristica - Patent No. 7530106 / US Patent and Trademark Office, 5 May, 2009 – Integritatea aplicatiillor - Patent No. 7526516 / US Patent and Trademark Office, 28th April, 2009 – Rospatent No. 2363047 – detectie de spam in imagini Peste 70 de patente pentru tehnologii de protectie si securitate informatica
  • 4. Proiecte locale - Romania Click to edit Master title style • Click to edit Master text styles • PatroKLes – Second level – Proiectat si lansat in 2006 • Third level – Scaneaza spatiul de web – Fourth level » Fifth level Romanesc (*.ro) • Krab Krawler – Proiectat si lansat in 2009 – Detecteaza programe malware pe Twitter
  • 5. Click to edit Romania style Atacuri in Master title Statistici: • Click to edit Master text styles – Second level Aproximativ 40 de noi site-uri infectate • Third level apar in – Fourth levelin fiecare zi Romania • In momentul de fata, scanam aproximativ 210,000 » Fifth level de site-uri din Romania • Numarul site-urilor scanate creste in medie cu 1600 de site-uri noi pe luna • La inceputul anului, 1 in 150 de site-uri romanesti erau infectate
  • 6. Click to edit Romania style Atacuri in Master title • Click to edit Master text styles – Second level • Third level – Fourth level » Fifth level
  • 7. Click to infectate title style Site-uri edit Master 2,000 • Click to edit Master text styles 1,800 15,000% 1,600 – Second level growth vs 2006 1,400 • Third level 1,200 – Fourth level 1,000 » Fifth level 800 600 400 200 0 2006 2007 2008 2009 Site-uri infectate, dintr-un total de 150k Sursa: Kaspersky Lab Analytical article http://www.viruslist.com/en/analysis?pubid=204792089
  • 8. Kaspersky + trafic.ro Click to edit Master title style • Analizaedit Master text styles din trafic.ro • Click to prioritara a site-urilor • Notificarea utilizatorilor inregistrati – Second level • Third level – Fourth level » Fifth level
  • 9. Click to edit Master title style • Click to edit Master text styles – Second level • Third level Multumesc! – Fourth level » Fifth level twitter.com/craiu www.kaspersky.ro